Ves tige (véŝ tĭj) n. 1. A visible trace, evidence or sign of something that has once existed but now no longer exists or appears.

Size: px
Start display at page:

Download "Ves tige (véŝ tĭj) n. 1. A visible trace, evidence or sign of something that has once existed but now no longer exists or appears."

Transcription

1 Ves tige (véŝ tĭj) n. 1. A visible trace, evidence or sign of something that has once existed but now no longer exists or appears.

2 Obtaining & Using Social Media Evidence Using Social Media to Make Your Case June 7, 2018

3 Overview Define Social Media Differences to Traditional Digital Forensics What You Need to Know Q&A

4 Intro to Social Media

5 Definition The use of web-based and mobile technologies that enable people to communicate easily via the Internet to share information and resources.

6 Popular Social Media Sites

7 Unique Visits in Millions

8 The Big Billion Unique Users Monthly Visitors 467 Million Accounts 330 Million average monthly active accounts

9 A Comparison Social Media v Traditional Digital Forensics

10 Traditional Digital Forensics Approach

11 98% Rule On Display Written to Device Artifact & Other Never Displayed 110% Rule?

12 Correspondence Memos s Instant messages Faxes Deleted Old and forgotten

13 Business Records Financial data Assets Calculations PRIOR DRAFTS DELETED DRAFTS Projections Everything you could imagine

14 Every Website visited All pictures from those websites Every Website from popups and popunders All maps, from Mapquest for example

15 Every INTERNET SEARCH And Search Results

16 What you can expect Conceptual Analysis How the computer was used IMs s Web-based s Deletion activity Wiping activity Software installed File Transfers CD/DVD burning Attached hardware Other networks attached Remote Access activity Do we have the Right system?

17 Acquisition Completeness The Whole Truth Used & Unused (Unallocated) Space Active & Inactive Systems Seemingly Inaccessible Systems & Media

18 Acquisition Methodology Forensically-sound Bit-for-Bit Clone Copy, clone, mirror Write-protect Place on Sterile Media MD5 or other authentication hash Chain of Custody Seal Evidence

19 Authentication Authenticate: Prove no change Prove Clones ARE the Same Method MD5 Hash (digital fingerprint) Industry-standard, industry-recognized 128-bit 1 in 1x10 38 chance for deceiving 8 times more likely to win Missouri Powerball (1 in 120,000,000) 1 in 700,000 chance of being struck by lightning

20 Authenticate Our Methodology MD5 Hash Digital Fingerprint MD f9ebd7478f bab050ed6b4612f0

21 Authenticate Prove copies (working) are the same COPY f9ebd7478fbab050ed6b4612f f9ebd7478fbab050ed6b4612f0

22 Authenticate Prove nothing has changed f9ebd7478fbab050ed6b4612f f9ebd7478fbab050ed6b4612f0

23 There is a difference Comparing Social Media to Traditional Digital Forensics

24 Best Source Traditional: Interacting Device Clone Social Media: Service Provider Subpoena/Search Warrant Account information IP address Activity conducted Referer information

25 Thoroughness Traditional: Cloning w/ Hashing Social Media: Use of APIs At mercy of service provider, as APIs only expose what the provider wants exposed Public / Private Views May need to be part of the individual s social circle to see everything

26 Dynamic Traditional: Slow-changing. Snapshot today likely captures everything Social Media: Changes by the minute Implication constant capturing/monitoring

27 Deleted Information Traditional: Relatively Easy Social Media: Difficult, if not impossible

28 What you Need to Know

29 Categorical Evidence Social Footprint Connections Communication Pattern who & when Pix & Vids Uploaded? Tagged within? Times of Activity When event occurred Apps Which? Purpose? Inferences?

30 Uses Background checks Impeach witness Determine position or acknowledgment of fact/circumstance Proof of association between individuals Evidence of intent, predisposition or motive Physical location alibi Locating assets Establish habits/routines

31 Facebook

32 Evidence Available on Device JSON snippets Cached pictures Some activity timelines Memory remnants

33 Evidence Available Online Public Profile Private Profile (i.e. friend or via credentials) Posts Messages User Information Friends / network Albums News Feed Wall Groups Videos Links

34 Evidence Available from Facebook Subpoena / Search Warrant Required Specific Post Information Specific Metadata Associated with Item URI, fb_item_type, parent_itemnum, thread_id, album_id, post_id, etc Temporal Data created_time, updated_time Ownership Data User_id, user_img, TO, to_id Other probative information Application used to post to facebook (i.e. iphone, social media client, web-site, etc.)

35 Evidence Available from Facebook Subpoena / Search Warrant Required Basic Subscriber Information (Neoselect) User Identification Number (FaceBook ID) address Date & Timestamp of account creation date Most Recent Logins Registered Mobile number Expanded Subscriber Information (Neoprint) Profile Contact information Mini-feed Status Update History Shares Notes Wall Postings Friend Listing with Friends Facebook IDs Groups Listing with Facebook Group IDs Future and Past Events Video Listing, with filename

36 Evidence Available from Facebook Subpoena/Search Warrant Required User Photos Group Information Private Messages IP Logs Limited & can be incomplete

37 fax: mail: Facebook, Inc ATTN: Security Department/Custodian of Records 1601 California Ave Palo Alto, CA NOTE: Facebook does notify end-user that their information is being requested. Facebook does not accept legal process for Facebook.com must be Facebook, Inc.

38 LinkedIn

39 Evidence Available on Device JSON snippets Cached pictures Some activity timelines Memory remnants

40 Evidence Available Online Public Profile Private Profile (i.e. friend or via credentials) Statuses Network Updates Connections Profile Group Information & Discussions

41 Evidence Available from LinkedIn Subpoena / Search Warrant Required Basic Subscriber Information Member Identification Number (LinkedIn ID) address Date & Timestamp of account creation date Billing Information Snapshot of Member Profile Page Profile Summary Experience Education Recommendations Groups Network Update Stream User Profile photo IP Logs IP Address Data Account Visited Quantity of visits from that IP address

42 fax: mail: LinkedIn Corporation ATTN: Legal Department 2029 Stierlin Court Mountain View, CA NOTE: LinkedIn does notify end-user that their information is being requested.

43 Twitter

44 Anatomy of a Tweet Twitter Mathematics OR When is 280 characters not 280 characters? This message is 280 characters long. It is a demonstration to show the amount of data that can exist within a single Tweet. Short & Sweet! The preceding exclamation point is the old limit of 140 characters. Currently Tweets may contain 280 characters giving you more to play with

45 Anatomy of a Tweet Unique Tweet ID Screen name of user ID of reply Author s user name Author s screen name Author s location (free-form) Author s biography Creation date of account Timezone Number of users author is following Number of favorites this user has User s language Number of followers this user has Geolocation Info Application that sent the Tweet And probably more

46 Evidence Available on Device JSON snippets Memory remnants Tweet contents itself

47 Evidence Available Online Public Profile / Private* -- Blurred Timeline Mentions Messages Favorites My Tweets* Followers / Followees Web-pages linked in Tweets YouTube video links found in Tweets Library of Congress Archival Project

48 Evidence Available from Twitter Subpoena / Search Warrant Required Twitter Account Information Account Profile Profile Photo Header Photo Background Image Location (self-completed) URL Bio Status Updates (Tweets) IP Logs NOTE: Twitter does not require real name use, verification or any identity authentication.

49 fax: (attn: Trust & Safety Legal Policy) mail: Twitter, Inc c/o Trust & Safety Legal Policy 1355 Market St., Ste. 900 San Francisco, CA NOTE: Information above is for Law Enforcement Twitter does notify end-user that their information is being requested.

50 Final Considerations Legal & Privacy Issues

51 Legal Issues Authentication FRE 901(a) must offer evidence sufficient to support a finding that the matter in question is what its proponent claims FRE 901(b)(4) can authenticate ESI with circumstantial evidence, reflecting: contents, substance, internal patterns or other distinctive characteristics Court rulings: Metadata supports this

52 Legal Issues Enter FRE 902 (13) & 902 (14) December 1, 2017 (13) Certified Records Generated by an Electronic Process or System (14) Certified Data Copied from an Electronic Device, Storage Medium, or File.

53 Legal Issues FRE 902(13) Certified Records Generated by an Electronic Process or System. A record generated by an electronic process or system that produces an accurate result, as shown by a certification of a qualified person that complies with the certification requirements of Rule 902(11) or (12). The proponent must also meet the notice requirements of Rule 902(11).

54 Legal Issues FRE 902 (14) Certified Data Copied from an Electronic Device, Storage Medium, or File. Data copied from an electronic device, storage medium, or file, if authenticated by a process of digital identification, as shown by a certification of a qualified person that complies with the certification requirements of Rule 902(11) or (12). The proponent also must meet the notice requirements of Rule 902(11).

55 FRE 902(14) Certification Doesn t necessarily require producing a witness Certification from a person with knowledge that the evidence is authentic Use of hash values (colloquially digital fingerprint )

56 FRE 902(14) Under the new Rule 902(14) self-authentication of ESI is permitted with a certification from a qualified person that the hash value of evidence was checked against the original and it was identical f9ebd7478fba b050ed6b4612f f9ebd7478fba b050ed6b4612f0

57 FRE 902(14) The Committee also made clear that even though ESI is self authenticating, it still remains susceptible to other evidentiary objections such as hearsay and relevance.

58

59

60 Legal Issues Authentication State of Connecticut v Eleck (2011 WL (Conn.App. 2011)) Rejected printouts of FaceBook pages incumbent on the party seeking to admit the social media data to offer detailed circumstantial evidence that tends to authenticate the unique medium of social media. State v Tienda (5358 S.W.3d 633 (Tx.App.2012)) Prosecution successfully admitted key MySpace evidence over defendant s objection based upon circumstantial evidence, including: Relevant Metadata Fields Other MySpace pages of same defendant, User of same username, nickname and addresses User ID Stated location, Communications with other suspects and Posted photos with associated date and time stamps

61 Privacy Issues Public vs Private Profiles Public: None Private: How do you get to the data? Friend request? Ethical Rules vary lots of contradiction and confusion Ohio s Model Rule of Professional Conduct would seem to prohibit this.

62 Privacy Issues Provider s Privacy Settings Change FaceBook is notorious for this What expectation of privacy does the individual have? What historical record exists showing that the information was once protected but a change in the provider s settings have made it available? What affect will Cambridge Analytica have?

63 Approach Needs to incorporate: Authentication / Admissibility Privacy Concerns Technical Issues Identification of Appropriate Source for Collecting the Data

64 Closing Thoughts: What to do when faced with Electronic Data Involve Digital Forensic Expert early Ability to plan discovery strategy Ensure admissibility Work closely with client

65 And the number 1 reason If you think hiring an Expert is expensive wait until you ve hired an amateur!

66 Vestige Digital Investigations Electronic Evidence Experts We Turn Digital Evidence into Intelligence TM Digital Forensics CyberSecurity ESI Discovery Services Damon S. Hacker, MBA, CCE, CISA, CFSX Cleveland Columbus Pittsburgh

Using Digital Forensics to Identify & Investigate Fraud

Using Digital Forensics to Identify & Investigate Fraud Using Digital Forensics to Identify & Investigate Fraud Presenter: Damon Hacker, MBA, CCE, CISA President Vestige Digital Investigations Ves tige (véŝ tĭj) n. 1. A visible trace, evidence or sign of something

More information

Cian Kinsella CEO, Digiprove

Cian Kinsella CEO, Digiprove Cian Kinsella CEO, Digiprove cian.kinsella@digiprove.com Malaga 7 th June 2013 Been developing software since 1972 Commercial and Freelance Co-founder of 3 Software Product Companies Have had many different

More information

#Admissibility: Getting Social Media Evidence into the Record

#Admissibility: Getting Social Media Evidence into the Record #Admissibility: Getting Social Media Evidence into the Record Paul Singer Deputy Chief Consumer Protection Division Texas Attorney General s Office Paul.Singer@texasattorneygeneral.gov Brad Schuelke AAG,

More information

Introduction to Twitter

Introduction to Twitter Introduction to Twitter Objectives After completing this class you will be able to: Identify what Twitter is Create a Twitter Account Customize your Twitter profile and settings Follow other users on Twitter

More information

ELECTRIC APP - PRIVACY POLICY

ELECTRIC APP - PRIVACY POLICY By accessing the website at http://electricchats.com ( Electric Site ) or any Electric mobile application (e.g., Electric ios, or Electric Android,) ( Electric App ) (collectively, the Electric Service

More information

Matt Danner Flashback Data

Matt Danner Flashback Data Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods

More information

FPKIPA CPWG Antecedent, In-Person Task Group

FPKIPA CPWG Antecedent, In-Person Task Group FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent

More information

AUTHENTICATION OF ELECTRONICALLY STORED EVIDENCE

AUTHENTICATION OF ELECTRONICALLY STORED EVIDENCE AUTHENTICATION OF ELECTRONICALLY STORED EVIDENCE SHARON N. PRUITT Assistant Attorney General Juvenile Crime Intervention P.O. Box 12548 Austin, TX 78711-2548 (512) 936-6406 sharon.pruitt@texasattorneygeneral.gov

More information

MUG NNAPLES MACFRIENDS USER GROUP

MUG NNAPLES MACFRIENDS USER GROUP Preparing for your Digital Afterlife Monday December 10, 2018 MUG NNAPLES MACFRIENDS USER GROUP About Jeff Bohr, owner of Naples Mac Help I have been using the Mac platform since 1986, and began using

More information

Social Media Tools. March 13, 2010 Presented by: Noble Studios, Inc.

Social Media Tools. March 13, 2010 Presented by: Noble Studios, Inc. March 13, 2010 Presented by: Noble Studios, Inc. 1 Communication Timeline 2 Familiar Social Media Sites According to Facebook, more than 1.5 million local businesses have active pages on Facebook According

More information

Snap Inc. Law Enforcement Guide

Snap Inc. Law Enforcement Guide Snap Inc. Law Enforcement Guide Last Updated: April 27, 2018 Download the most recent version at: https://www.snapchat.com/lawenforcement Mailing Address: Custodian of Records Snap Inc. 63 Market Street

More information

TOP ETF PICKS PRIVACY NOTICE Last updated October 2018

TOP ETF PICKS PRIVACY NOTICE Last updated October 2018 TOP ETF PICKS PRIVACY NOTICE Last updated October 2018 INTRODUCTION Thank you for choosing to be part of our community at TopETFpicks ( company, we, us, or our ). We are committed to protecting your personal

More information

Twitter Basics at the Deerfield Public Library

Twitter Basics at the Deerfield Public Library Twitter Basics at the Deerfield Public Library Class Outline: 1) What is Twitter? 2) Setting up an account and profile 3) Terms you should know & examples 4) How do I decide what to write? 5) Q & A Expected

More information

DIGITAL EVIDENCE TOOL BOX

DIGITAL EVIDENCE TOOL BOX DIGITAL EVIDENCE TOOL BOX Toolbox Page 1 of 23 Introduction This guide is meant to provide a basic understanding of the industry standards, best practices and practical applications for the use of digital

More information

BADGECERT SHARING GUIDE - URL

BADGECERT SHARING GUIDE - URL BADGECERT SHARING GUIDE - URL About BadgeCert Just completed a continuing education course? Achieve certification in your industry area? Welcome to the world of BadgeCert. Our company works with your verified

More information

Trends in Mobile Forensics from Cellebrite

Trends in Mobile Forensics from Cellebrite Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with

More information

Marketing & Back Office Management

Marketing & Back Office Management Marketing & Back Office Management Menu Management Add, Edit, Delete Menu Gallery Management Add, Edit, Delete Images Banner Management Update the banner image/background image in web ordering Online Data

More information

Discover (n.): This feature surfaces personalized content tailored to your interests.

Discover (n.): This feature surfaces personalized content tailored to your interests. Glossary: General Terms @: The @ sign is used to call out usernames in Tweets: "Hello @twitter!" People will use your @username to mention you in Tweets, send you a message or link to your profile. @username:

More information

SOCIAL MEDIA. Charles Murphy

SOCIAL MEDIA. Charles Murphy SOCIAL MEDIA Charles Murphy Social Media Overview 1. Introduction 2. Social Media Areas Blogging Bookmarking Deals Location-based Music Photo sharing Video 3. The Fab Four FaceBook Google+ Linked In Twitter

More information

Social Media Reputation Management

Social Media Reputation Management Social Media Reputation Management If you are using social media sites such as Facebook or Twitter, there are some simple steps you can take to manage your reputation and protect your identity. Even if

More information

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:

More information

3. How is technology used to serve our advertisements on other Sites that you visit and what choices do you have?

3. How is technology used to serve our advertisements on other Sites that you visit and what choices do you have? Privacy Policy for U.S. Websites Scope. This Privacy Policy applies to personal information collected online, used and disclosed by Stanley Black & Decker, Inc. s affiliates including but not limited to

More information

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to

More information

A Guide to using Social Media (Facebook and Twitter)

A Guide to using Social Media (Facebook and Twitter) A Guide to using Social Media (Facebook and Twitter) Facebook 1. Visit www.facebook.com 2. Click the green Sign up button on the top left-hand corner (see diagram below) 3. Enter all the information required

More information

Getting Started with Social Media

Getting Started with Social Media Getting Started with Social Media Step 1: Go to www.facebook.com Step 2: Fill out the Sign Up form located on the homepage, including full name, e-mail address, a password and birthday, to start a free

More information

DSS User Group. December Google+ Local, Pages, Profiles

DSS User Group. December Google+ Local, Pages, Profiles DSS User Group December 2012 Google+ Local, Pages, Profiles DSS User Group December 2012 Agenda Google+ Google+ - What It Is, Why It Matters Google+ Profiles Google+ Pages Google+ Local How to view traffic

More information

Solv3D Privacy Policy

Solv3D Privacy Policy Solv3D Inc. ( Solv3D, We, Us, or Our ) is committed to transparency in the collection and use of your personal information. The Privacy Policy below describes how we collect and use personal information,

More information

Digital Forensics for Attorneys

Digital Forensics for Attorneys Lars E. Daniel, EnCE, ACE, AME, CTNS Digital Forensics Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital

More information

Understanding Computer Forensics

Understanding Computer Forensics Understanding Computer Forensics also known as: How to do a computer forensic investigation... and not get burned Nick Klein SANS Canberra Community Night 11 February 2013 The scenario... Your boss tells

More information

Web Services Privacy Policy. What the Privacy Policy does. What the Privacy Policy does not do

Web Services Privacy Policy. What the Privacy Policy does. What the Privacy Policy does not do Web Services Privacy Policy Revised and Effective: April 14, 2017 What the Privacy Policy does The Web Services Privacy Policy describes the information Spartan Net collects about you when you use any

More information

Documenting a Digital Forensic Investigation - Guide

Documenting a Digital Forensic Investigation - Guide Contents How to Setup Forensic Notes to Document Your Investigations... 2 Creating Folders... 3 Deleting a Folder... 6 Creating Nested Folders... 8 Notetaking: Intake Officer... 9 Creating a Notebook...

More information

PRIVACY POLICY TABLE OF CONTENTS. Last updated October 05, 2018

PRIVACY POLICY TABLE OF CONTENTS. Last updated October 05, 2018 PRIVACY POLICY Last updated October 05, 2018 Thank you for choosing to be part of Vistalytics Inc., ( Company, we, us, or our ). We are committed to protecting your personal information and your right

More information

Cyber Security Ethics at the Boundaries: Systems Maintenance and the Tallinn Manual. Sandra Braman

Cyber Security Ethics at the Boundaries: Systems Maintenance and the Tallinn Manual. Sandra Braman Cyber Security Ethics at the Boundaries: Systems Maintenance and the Tallinn Manual Sandra Braman The Argument Points of disagreement among the international group of experts responsible for the Tallinn

More information

Getting started with social media and comping

Getting started with social media and comping Getting started with social media and comping Promotors are taking a leap further into the digital age, and we are finding that more and more competitions are migrating to Facebook and Twitter. If you

More information

SOCIAL MEDIA 101. Learn the basics of social media to effectively communicate with the public you serve.

SOCIAL MEDIA 101. Learn the basics of social media to effectively communicate with the public you serve. SOCIAL MEDIA 101 Learn the basics of social media to effectively communicate with the public you serve. FACEBOOK and TWITTER Which social media platforms, if any, does your County currently utilize to

More information

Digital Evidence for the Domestic Practitioner

Digital Evidence for the Domestic Practitioner Digital Evidence for the Domestic Practitioner Presented by: Simon Ragona III, EnCE, CCE, ACE, Director Kyle Poppenwimer, CCE, ACE, Senior Digital Forensic Examiner T&M Protection Resources, LLC 230 Park

More information

ETSY.COM - PRIVACY POLICY

ETSY.COM - PRIVACY POLICY At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,

More information

DIGITAL MARKETING AND SOCIAL MEDIA COMMUNICATION FOR THE NSS EPALE CY TEAM AND STAKEHOLDERS

DIGITAL MARKETING AND SOCIAL MEDIA COMMUNICATION FOR THE NSS EPALE CY TEAM AND STAKEHOLDERS DIGITAL MARKETING AND SOCIAL MEDIA COMMUNICATION FOR THE NSS EPALE CY TEAM AND STAKEHOLDERS 6 και 7 Ιουνίου, 8:00 π.μ.-15:00 μ.μ. Παιδαγωγικό Ινστιτούτο Κύπρου, Αίθουσα Π206 THE SEMINAR WAS HELD DURING

More information

A forensically robust method for acquisition of icloud data. Kurt Oestreicher Champlain College

A forensically robust method for acquisition of icloud data. Kurt Oestreicher Champlain College A forensically robust method for acquisition of icloud data Kurt Oestreicher Champlain College Background Data stored on cloud services increasingly important to forensic investigations As of June 2013:

More information

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC Employee Privacy, Digital Evidence, and the CFE Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC The Good Old Days CFE s Aerial View 1. What Information

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is

More information

Financial Forensic Accounting

Financial Forensic Accounting Financial Forensic Accounting Qualification Scope of Content Version: as at 02 March 2018 6. SCOPE OF CONTENT 1. Digital forensics overview 1.1. History of digital forensics 1.2. Sources of electronic

More information

Computer forensics Aiman Al-Refaei

Computer forensics Aiman Al-Refaei Computer forensics Aiman Al-Refaei 29.08.2006 Computer forensics 1 Computer forensics Definitions: Forensics - The use of science and technology to investigate and establish facts in criminal or civil

More information

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case. E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal

More information

Create an Account... 2 Setting up your account... 2 Send a Tweet... 4 Add Link... 4 Add Photo... 5 Delete a Tweet...

Create an Account... 2 Setting up your account... 2 Send a Tweet... 4 Add Link... 4 Add Photo... 5 Delete a Tweet... Twitter is a social networking site allowing users to post thoughts and ideas in 140 characters or less. http://www.twitter.com Create an Account... 2 Setting up your account... 2 Send a Tweet... 4 Add

More information

Adobe Sign and 21 CFR Part 11

Adobe Sign and 21 CFR Part 11 Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted

More information

KIK s GUIDE FOR LAW ENFORCEMENT

KIK s GUIDE FOR LAW ENFORCEMENT Thanks for checking out our law enforcement guide. We take the safety of our users very seriously, and we hope this guide will be a useful tool for you. It includes information about our app; the features

More information

USE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY

USE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY Peer to Peer Networking BitTorrent, a popular peer to peer networking software, can be downloaded for free from the BitTorrent website. Once the user has installed the program on their computer, they can

More information

Social Media Workshop

Social Media Workshop Social Media Workshop RHS Wisley, 21 March 2017 Social: interacting with other people, sharing information with them & receiving information from them. + Media: instrument of communication, like the internet,

More information

PayThankYou LLC Privacy Policy

PayThankYou LLC Privacy Policy PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the

More information

Cellular Telephone and Social Media Subpoena Guide updated May 2015

Cellular Telephone and Social Media Subpoena Guide updated May 2015 Cellular Telephone and Social Media Subpoena Guide updated May 2015 The chart below contains the contact information for the Centers for a few major cell phone companies and social media networks. These

More information

Privacy Policy. Optimizely, Inc. 1. Information We Collect

Privacy Policy. Optimizely, Inc. 1. Information We Collect Privacy Policy Posted: Nov. 19, 2015; Effective Date: Nov. 19, 2015 Optimizely, Inc. This privacy policy applies to Optimizely s Virtual Experience website owned and/or operated for Optimizely, Inc., currently

More information

Digital Forensics UiO

Digital Forensics UiO Digital Forensics UiO About Me I am: Eivind Utnes, M.Sc. I work for: Watchcom Security Group AS I work as: Information Security Consultant Security Audits Digital Forensics / Incident Response Education

More information

MEMA. Memory Management for Museum Exhibitions. Independent Study Report 2970 Fall 2011

MEMA. Memory Management for Museum Exhibitions. Independent Study Report 2970 Fall 2011 MEMA Memory Management for Museum Exhibitions Independent Study Report 2970 Fall 2011 Author: Xiaoning Bai Yuanyuan Ye Supervisors: Dr. Peter Brusilovsky, Yiling Lin Part I. Introduction to MEMA MEMA is

More information

Internet Applications. Q. What is Internet Explorer? Explain features of Internet Explorer.

Internet Applications. Q. What is Internet Explorer? Explain features of Internet Explorer. Internet Applications Q. What is Internet Explorer? Explain features of Internet Explorer. Internet explorer: Microsoft Internet Explorer is a computer program called a browser that helps you interact

More information

Digital Forensics UiO. Digital Forensics in Incident Management. About Me. Outline. Incident Management. Finding Evidence.

Digital Forensics UiO. Digital Forensics in Incident Management. About Me. Outline. Incident Management. Finding Evidence. Digital Forensics UiO Outline Incident Management Digital Forensics Finding Evidence 3 About Me I am: Eivind Utnes, M.Sc. I work for: Watchcom Security Group AS I work as: Information Security Consultant

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of

More information

USE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY

USE OF TECHNOLOGY TO DISTRIBUTE CHILD PORNOGRAPHY TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to

More information

Digital Forensics UiO

Digital Forensics UiO Digital Forensics UiO About Me I am: Eivind Utnes, M.Sc. I work for: Watchcom Security Group AS I work as: Head of Security Senior Information Security Consultant Security Audits Digital Forensics / Incident

More information

Chapter 7 Forensic Duplication

Chapter 7 Forensic Duplication Chapter 7 Forensic Duplication Ed Crowley Spring 11 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool

More information

Digital Forensics UiO

Digital Forensics UiO About Me I am: Eivind Utnes, M.Sc. I work for: Watchcom Security Group AS Digital Forensics UiO I work as: Head of Security Senior Information Security Consultant Security Audits Digital Forensics / Incident

More information

Privacy Policy. Information we collect about you

Privacy Policy. Information we collect about you Privacy Policy Briefly.co.za ( we, and us ) respects the privacy of its users and has developed this Privacy Policy to demonstrate its commitment to protecting your privacy. This Privacy Policy describes

More information

MEMORANDUM. TO: '''''''' '''''''''''''''''''''''''''''', Colorado Legal Services, Grand Junction Office

MEMORANDUM. TO: '''''''' '''''''''''''''''''''''''''''', Colorado Legal Services, Grand Junction Office MEMORANDUM TO: '''''''' '''''''''''''''''''''''''''''', Colorado Legal Services, Grand Junction Office FROM: ''''''''''''' ''''''''''''''''''''', University of Colorado Law School RE: Admission of Facebook

More information

GRANDSTREAM PRIVACY STATEMENT

GRANDSTREAM PRIVACY STATEMENT GRANDSTREAM PRIVACY STATEMENT This Privacy Statement governs how Grandstream Networks, Inc. and its affiliates ( Grandstream, us, our or we ) may collect, use, and disclose information that we obtain through

More information

TITLE SOCIAL MEDIA AND COLLABORATION POLICY

TITLE SOCIAL MEDIA AND COLLABORATION POLICY DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the

More information

etouches, Inc. Privacy Policy

etouches, Inc. Privacy Policy etouches, Inc. Privacy Policy Effective Date: March 1, 2017 This privacy policy applies to etouches, Inc. ( etouches ) and covers the site, www.etouches.com corporate site and application(s) accessed via

More information

Chapter 7 Forensic Duplication

Chapter 7 Forensic Duplication Chapter 7 Forensic Duplication Ed Crowley Spring 10 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool

More information

WORDPRESS. Log in here: ADDING THE INSTRUCTOR AS A USER

WORDPRESS. Log in here:  ADDING THE INSTRUCTOR AS A USER WORDPRESS Log in here: http://www.quiltworx.com/wp-login ADDING THE INSTRUCTOR AS A USER Once logged in, you will be brought to the WP Dashboard screen. Hover over Users in the left column, then click

More information

When this policy mentions WanderJaunt, we, us, or our, it refers to the WanderJaunt, Inc.

When this policy mentions WanderJaunt, we, us, or our, it refers to the WanderJaunt, Inc. WanderJaunt Privacy Policy Last Updated: June 20, 2018 Thank you for using WanderJaunt! This Privacy Policy describes how we collect, use, process, and disclose your information, including personal information,

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

The Trustworthiness of Digital Records

The Trustworthiness of Digital Records The Trustworthiness of Digital Records International Congress on Digital Records Preservation Beijing, China 16 April 2010 1 The Concept of Record Record: any document made or received by a physical or

More information

Maximizing the Business Value of Social Sites

Maximizing the Business Value of Social Sites Maximizing the Business Value of Social Sites How to Work with Twitter (nuances & timeframe): Twitter is known as a 'real time social networking' site, a place for sharing information as it happens, and

More information

PRIVACY POLICY OUR SERVICES. Last modified: November 29, 2015

PRIVACY POLICY OUR SERVICES. Last modified: November 29, 2015 PRIVACY POLICY Last modified: November 29, 2015 Thank you for using Creatubbles. Creatubbles PTE. LTD and its affiliates ( Creatubbles ) values your privacy, and we want you to know what information we

More information

Getting Started with the Aloha Community Template for Salesforce Identity

Getting Started with the Aloha Community Template for Salesforce Identity Getting Started with the Aloha Community Template for Salesforce Identity Salesforce, Winter 18 @salesforcedocs Last updated: November 30, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved.

More information

Trusted Profile Identification and Validation Model

Trusted Profile Identification and Validation Model International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 1 (May 2013), PP. 01-05 Himanshu Gupta 1, A Arokiaraj Jovith 2 1, 2 Dept.

More information

Lecture 41 Blockchain in Government III (Digital Identity)

Lecture 41 Blockchain in Government III (Digital Identity) Blockchains Architecture, Design and Use Cases Prof. Sandip Chakraborty Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 41 Blockchain in Government III

More information

Location Based Services Privacy Check In

Location Based Services Privacy Check In Location Based Services Privacy Check In Is the location based feature required? Does the service use GPS or the like when you check in or tweet? Can a friend update your location? OBTAINING LOCATION INFORMATION

More information

BADGECERT SHARING GUIDE - URL

BADGECERT SHARING GUIDE - URL BADGECERT SHARING GUIDE - URL About BadgeCert Just completed a continuing education course? Achieve certification in your industry area? Welcome to the world of BadgeCert. Our company works with your verified

More information

Social Security Number Protection Policy.

Social Security Number Protection Policy. Privacy HIPAA Notice of Privacy Practices. Website Privacy Policy. Social Security Number Protection Policy. HIPAA Notice of Privacy Practices: To read more about our privacy practices regarding health

More information

1 BADGE EARNER GUIDE

1 BADGE EARNER GUIDE BADGE EARNER GUIDE 1 2 Welcome to Acclaim Welcome to a new way of managing your professional achievements and learning outcomes: badging, through Acclaim. Acclaim is a badging platform backed by Pearson,

More information

DECENTRALIZED SOCIAL NETWORKING WITH WORDPRESS. November 7, 2018 WordPress Meetup Vienna Alex Kirk

DECENTRALIZED SOCIAL NETWORKING WITH WORDPRESS. November 7, 2018 WordPress Meetup Vienna Alex Kirk DECENTRALIZED SOCIAL NETWORKING WITH WORDPRESS DECENTRALIZED? Centralized = control is with a single entity If you use Facebook, the servers are all controlled by Facebook Inc. Facebook can draw conclusions

More information

EXPERT WITNESS: Completion of a perfect circle

EXPERT WITNESS: Completion of a perfect circle An Agency Under MOSTI EXPERT WITNESS: Completion of a perfect circle Cyber Forensics Workshop, Doha,Qatar February 21, 2008 By R.Azrina R.Othman CyberSecurity Malaysia Copyright 2008 CyberSecurity Malaysia

More information

Privacy Policy. Last Updated: August 2017

Privacy Policy. Last Updated: August 2017 Privacy Policy Last Updated: August 2017 Here at ConsenSys we know how much you value privacy, and we realize that you care about what happens to the information you provide to us through our website,

More information

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017 DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

Growing Consumer Clash with Photo-Sharing: Privacy vs. Tech Giants Cool, Convenience

Growing Consumer Clash with Photo-Sharing: Privacy vs. Tech Giants Cool, Convenience Growing Consumer Clash with Photo-Sharing: Privacy vs. Tech Giants Cool, Convenience 1 Photo-sharing report Methodology Americans are concerned about online privacy and security and are taking steps to

More information

ONLINE EVALUATION FOR: Company Name

ONLINE EVALUATION FOR: Company Name ONLINE EVALUATION FOR: Company Name Address Phone URL media advertising design P.O. Box 2430 Issaquah, WA 98027 (800) 597-1686 platypuslocal.com SUMMARY A Thank You From Platypus: Thank you for purchasing

More information

Using Social Media and New Media Technologies in Fundraising

Using Social Media and New Media Technologies in Fundraising Using Social Media and New Media Technologies in Fundraising Presented by: Maria Semple, The Prospect Finder LLC Copyright 2013 The Prospect Finder LLC The Options Seem Endless.. 1.15 billion monthly active

More information

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty

More information

CRYPTALGO HOLDINGS AG - Privacy Policy page 1 of 5

CRYPTALGO HOLDINGS AG - Privacy Policy page 1 of 5 page 1 of 5 1.1 Privacy Policy 1.2 Cryptalgo Holdings AG ("CRYPTALGO" or "We") is committed to protecting your privacy. In this notice, you can read about the information we collect from you when you visit

More information

BrainCert Enterprise LMS. Learning Management System (LMS) documentation Administrator Guide Version 3.0

BrainCert Enterprise LMS. Learning Management System (LMS) documentation Administrator Guide Version 3.0 BrainCert Enterprise LMS Learning Management System (LMS) documentation Administrator Guide Version 3.0 1 P a g e Table of Contents... 3... 3... 4... 4... 5... 5... 6... 6... 8... 8... 9... 9... 10...

More information

Test Plan and Cases (TPC)

Test Plan and Cases (TPC) Test Plan and Cases (TPC) LiveRiot Video Editing System and social networking enhancement Team 04 Yang Li Haoyu Huang Project anager, Life Cycle Planner Feasibility Engineer, System Architect Ye Tian Zichuan

More information

DROPBOX.COM - PRIVACY POLICY

DROPBOX.COM - PRIVACY POLICY Dropbox Privacy Policy Last Modified: October 15, 2012 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access the Dropbox service

More information

CRM Insights. User s Guide

CRM Insights. User s Guide CRM Insights User s Guide Copyright This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.

More information

You can return this form to it by post, fax or .

You can return this form   to it by post, fax or  . Electoral Register: When you register to vote, be sure to opt out of the edited (open) version of the Electoral Register. If you have already registered in this electoral cycle, you can also contact your

More information

TECHNICAL EVIDENCE IN STALKING PROSECUTIONS

TECHNICAL EVIDENCE IN STALKING PROSECUTIONS TECHNICAL EVIDENCE IN STALKING PROSECUTIONS Where to Get It and How to Get It In SUPPORT This project was supported by Grant No. 2009-TA-AX-K024 awarded by the U.S. Department of Justice, Office on Violence

More information

Digital Marketing Proposal

Digital Marketing Proposal Digital Marketing Proposal ---------------------------------------------------------------------------------------------------------------------------------------------- 1 P a g e We at Tronic Solutions

More information

Open Federated Social Networks Oscar Rodríguez Rocha

Open Federated Social Networks Oscar Rodríguez Rocha Open Federated Social Networks Oscar Rodríguez Rocha 178691 Federated document database Documents are stored on different servers Access through browsers Any individual, company, or organization can own

More information

PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH?

PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH? PAPER PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH? By Peter Varhol www.actian.com ignificant change has arrived in how computing and storage consumes data concerning individuals. Merchants, data collection

More information

Chatter Answers Implementation Guide

Chatter Answers Implementation Guide Chatter Answers Implementation Guide Salesforce, Summer 18 @salesforcedocs Last updated: July 26, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information